Sciweavers

3971 search results - page 721 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
SENSYS
2004
ACM
14 years 4 months ago
Call and response: experiments in sampling the environment
Monitoring of environmental phenomena with embedded networked sensing confronts the challenges of both unpredictable variability in the spatial distribution of phenomena, coupled ...
Maxim A. Batalin, Mohammad H. Rahimi, Yan Yu, Duo ...
ACSW
2006
14 years 1 days ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
RTAS
2009
IEEE
14 years 5 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
PERCOM
2004
ACM
14 years 10 months ago
Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing
One way to improve inferences on sensor data is to tune the algorithms through a time-consuming offline procedure. A less expensive, and potentially more accurate method is to use...
Ezekiel S. Bhasker, Steven W. Brown, William G. Gr...
ICDCSW
2007
IEEE
14 years 5 months ago
Context to Make You More Aware
The goal of our work is to help users make more informed choices about what physical activities they undertake. One example is to provide relevant information to help someone choo...
Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jona...